Networking CH. 1-6 preparation for midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?

P2P

Which email protocol allows an email client to download email messages to the local computer?

POP3

Which computers are the highest authorities in the Domain Name System hierarchy?

Root servers

You are a network administrator for an organization. You are asked to create a shared folder on a Microsoft Windows system so that other users on the same network are able to access its contents. To be able to meet this requirement, which protocol is likely to be used?

SMB

DNS clients can use this zone to obtain information such as IP address that correspond to DNS domain names or services. What type of DNS zone is this?

SOA NS

You are a network administrator and you need to access the secure command line interface access of an edge router on your network. The router uses cryptography for remote authentication. Which protocol is the router configured with for this purpose?

SSH

By default, which of the following components of the composite metric are considered for Enhanced Interior Gateway Routing Protocol (EIGRP) ?

Bandwidth and delay

Which of these is considered a secure place to store a list of documented network passwords?

Password Manager

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Patch Cable

You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used?

Star-bus

You want to display the cache entries for 192.168.1.101. Which parameter should you use with the arp command?

-p

What is the Internet standard MTU?

1,500 bytes

Which of the following format can be considered a valid IPv6 address?

2001:0db8:0000:0003:0000:ff00:0042:8329

Refer to the exhibit. Which of the pictured software is a port scanner?

A port scanner is an application designed to probe a server or host for open transport layer ports. This is often used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities. A port scanner will indicate open ports on specific servers (IP addresses) as well as those that are blocked. "B"

Refer to the exhibit. Which of the pictured software is a protocol analyzer?

A protocol analyzer is a software tool used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Ethernet and IP protocol analyzers usually organize data based on the OSI or the TCP/IP model. "C"

A routing protocol's reliability and priority are rated by what measurement?

AD

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

All devices on your local network

Which routing protocol does an exterior router use to collect data to build its routing tables?

BGP

You suspect that the Webserver, which is located on your network and hosts multiple Internet facing Websites. The Webserver runs on Windows Server 2008. After receiving complaints from the users of Webserver occasionally being unavailable, you investigate and find that it is getting flooded with many ping requests. What should you do to immediately handle this situation?

Block all incoming ICMP requests

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops?

By implementing a limit on the number of hops allowed in a path

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, Cat 6a, Cat 7

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

You are planning to implement dual stack of IPv4 and IPv6 in your network. Currently, your network runs of servers, routers, and switches that have not been upgraded for several years. You are still running the Windows Server 2003. When implementing dual stack, which of the following will be your primary concerns?

Ensuring that Internet Service Providers (ISPs) work with IPv6

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

Entrance Facility

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil Twin

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/10

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?

FHSS

You manage a small stub network that has a router configured with static routing. If the connection to the next hop goes down, what action will the router perform?

It will continue to route traffic on the same path.

You have configured a DHCP pool to allocate the IP addresses to the system for 3 days. What have you defined?

Lease time

What is the first step of inventory management?

List all components on the network

You are asked to install a device that will combine several connections to the Internet and provide the sum of the available network speeds to an internal network while equally sharing the data traffic among all the Internet connections. Which of the following devices are you asked to install?

Load balancer

Which fiber connector contains two strands of fiber in each ferrule?

MTRJ

Which type of address is used at the Transport layer to identify the receiving application?

Port

The network administrator has configured the enterprise firewall to permit port 21 to allow FTP transfers to occur from outside the enterprise. Users can connect to the FTP server that is located on the enterprise network. However, file transfers fails. Why could this be?

Port 20 along with port 21 must also be permitted

Your organization has multiple remote offices. The users at the remote office often remotely connect to the application servers. Which of the protocols should you enforce for encrypted communication?[Choose all that apply].

RDP SSH

You need to highlight the location of physical servers and network devices mounted on standardized frames that are installed within a datacenter to a new colleague. Which of the following types of diagrams should you show?

Rack Diagram

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

Rack Ears

You have been asked to host a new e-commerce Website. Your manager has asked you to configure the Website with a certificate. After hosting the Website with the certificate, which security protocol have you use?

SSL/TLS

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

Which protocol's header would a Layer 4 device read and process?

TCP

Why would a network administrator implement vulnerability scanning on a network?

To reveal vulnerabilities in the network

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

VoIP Gateway

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

White/green

What type of diagram shows a graphical representation of a network's wired infrastructure?

Wiring Schematic

You've decided to run an Nmap scan on your network. What app could you open to perform this task? Choose all that apply.

Zenmap, Command Prompt and Powershell

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?

cat 6a

Which of these commands is available only in Linux?

dig

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig /release

Refer to the exhibit. Which of the following command is likely to show the required output? Ex. Reply from 96.30.22.166: bytes=32 time=127ms TTL=55

ping

To troubleshoot a network problem, you are required to use a packet analyzer on a Unix based system. Which of the following command line interface commands will provide you with the required functionality?

tcpdump

Refer to the exhibit. Which of the following command is likely to show the required output? ex. over a maximum of 30 hops

traceroute

At which OSI layer does IP operate?

Network Layer

You need to implement high availability in your network. One implementation company ensures that their implementation will provide 99% of availability in a period of one year. With the mentioned availability, what would be the total downtime in a year?

1.5 days

Which of the following IPv4 and IPv6 addresses are correctly portrayed using CIDR notation? [Choose all that apply].

2001:db8::/32 192.168.2.0/24

What decimal number corresponds to the binary number 11111111?

255

You need to connect to a colleague's system using the default Microsoft Windows remote desktop application to troubleshoot an application issue. Which port should be opened on the colleague's system firewall to ensure successful remote connection?

3389

Users on a network are complaining that they cannot connect to a Webserver by its name in the Web browser. You can access the Webserver using its IP address. You discover an access list is blocking several UDP ports. Which port should you remove from the access list to allow users to connect to the Webserver?

53

A computer is configured with a subnet mask of 255.255.255.192. How many IP addresses, including the network and broadcast addresses, are available in the subnet the computer is in?

64

You need to block all unsecured web traffic using its default port from a specific network segment of the enterprise network. Which port would you block to achieve this?

80

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11n

Which Bluetooth class has the highest power output?

Class 1

You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer?

Client-Server

What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?

Coaxial cable, F-connector

You are asked to perform an analysis on the network that will allow you to deduce information from patterns in communication. Which of the following types of analysis are you asked to perform?

Data traffic analysis

What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?

Default Gateway

A router receives a packet with a destination address that is not found within its routing table. The router is configured to send all such packets to a specific next hop address. What is this next hop address called?

Default route

Which of the following is true about the OSPF routing protocol?

Each router has complete knowledge of the network topology.

When a router can't determine a path to a message's destination, where does it send the message?

Gateway of last resort

Refer to the exhibit. Which of the following type of diagram is being depicted? reference image for question

Logical Network Topology

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

Which type of DNS record identifies an email server?

MX Record

Which of the following describes the configuring of MAC reservation in a DHCP server?

Manually allocate the MAC address to a desired IP address in the DHCP server

In which of the following applications can a virtual IP address be used? [Choose all that apply].

NAT Gateway Redundancy Protocols

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which of the following statements is true about Fault tolerance?1) It is a direct result of the design of the network itself.2) It is the name of the feature that allows for dual layer 2 connections between switches.3) Enables a network to continue functioning normally in case of a partial failure.

Statements 1 and 3 are true

What method of IP network configuration would you use for devices such as servers and printers so that all users on a network will always be able to reach these resources using the same network address?

Static IP address allocation

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Static Route

If you need to perform port scanning in your network, which of the following tool are you likely to use? [Choose all that apply].

Superscan Angry IP Scanner

Your network firewall currently allows only HTTP traffic to pass through. You need to allow FTP traffic to pass through the firewall. Which of the following should be allowed?[Choose all that apply].

TCP port 2` TCP port 20

Which part of a MAC address is unique to each manufacturer?

The OUI

When interconnecting a switch port to a patch panel, which of the following information should be documented according to best practices? [Choose all that apply].

The network device on the other end of the link The port number of the switch used

You have been asked to set up a new data center. Before you proceed with the actual setup, you need to create various diagrams. You also need to create a rack diagram of an existing rack that you want to use. Which of the following could be the reason for you to create one such diagram? [Choose all that apply].

To determine the shapes of the equipment that you need to purchase To determine which equipment to purchase

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

You have been experiencing connectivity with various websites. The response time to open these websites is high. You tested the same websites from your home and could open them much faster. You assume that the slow access to the Websites might be due to high latency. Which of the given utility is likely to help you in finding the source that may be causing the latency issue?

Traceroute

Which transmission characteristic is never fully achieved?

Bandwidth

What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

In the client-server model, what is the primary protocol used for communication between a browser and web server?

HTTP

Refer to the exhibit. Which of the following configuration is being displayed to increase the network uptime?

High availability

If you use the ping command to send an echo request from one host to the other, then which of the following protocols have you used?

ICMP

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Which email protocol allows an email client to read mail stored on the mail server?

IMAP4

A network engineer is configuring a network to be able to relay IPv6 packets. The network only supports IPv4 and does not have dual-stack support. Which of the following can be used to successfully relay IPv6 packets over this network?

IPv6 tunneling

Which OSI layer is responsible for directing data from one LAN to another?

Network Layer

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

Remote Desktop

Which of the following devices are you likely to find in the MDF? Choose all that apply.

Routers, Switches and KVM Switch

Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?

SSL and TLS

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

Refer to the following statements: This type of diagram depicts how devices are interconnected to each other using wires and cabling2) This type of diagram depicts the arrangement of devices and how they communicate with each other.Which diagram types are being described?

Statement 1 describes a physical network diagram while statement 2 describes a logical one

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server


Set pelajaran terkait

AP US History vocabulary chapter 6 Making War and Republican Governments, 1776-1789

View Set

Introduction to Shielded Metal Arc Welding (SMAW)

View Set